Skip to content

Commit d056290

Browse files
committed
Round 1 of updating ui copy
1 parent 0bd43f8 commit d056290

File tree

23 files changed

+58
-58
lines changed

23 files changed

+58
-58
lines changed

src/content/docs/cloudflare-one/integrations/service-providers/custom.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,12 @@ sidebar:
55
label: Custom integration
66
order: 1
77

8-
description: Configure custom device posture checks in Cloudflare Zero Trust using a service-to-service integration.
8+
description: Configure custom device posture checks in Cloudflare One using a service-to-service integration.
99
---
1010

1111
import { Render } from "~/components";
1212

13-
Cloudflare Zero Trust allows you to enforce custom device posture checks on your applications. This involves configuring a WARP service-to-service integration that periodically calls the external API of your choice, whether it is a third-party endpoint provider or a home built solution. When called, the API will receive device identifying information from Cloudflare and be expected to return a value between `0` to `100`. You can then set up a device posture check that determines if the returned value counts as a pass or fail; for example, you could allow access to a user only if their device has a posture value greater than `60`.
13+
Cloudflare One allows you to enforce custom device posture checks on your applications. This involves configuring a WARP service-to-service integration that periodically calls the external API of your choice, whether it is a third-party endpoint provider or a home built solution. When called, the API will receive device identifying information from Cloudflare and be expected to return a value between `0` to `100`. You can then set up a device posture check that determines if the returned value counts as a pass or fail; for example, you could allow access to a user only if their device has a posture value greater than `60`.
1414

1515
```mermaid
1616
sequenceDiagram
@@ -124,7 +124,7 @@ To create a custom service-to-service integration:
124124

125125
5. In **Access client ID** and **Access client secret**, enter the Access service token used to authenticate to your external API.
126126
6. In **Rest API URL**, enter the external API endpoint that Cloudflare will query for posture information (for example, `https://api.example.com`). For more information, refer to [External API requirements](#external-api-requirements).
127-
7. In **Polling frequency**, choose how often Cloudflare Zero Trust should query the external API for information.
127+
7. In **Polling frequency**, choose how often Cloudflare One should query the external API for information.
128128
8. Select **Test and save**. The test checks if Cloudflare can authenticate to the API URL using the provided Access credentials.
129129

130130
Next, [configure a device posture check](#4-configure-the-posture-check) to determine if a given posture score constitutes a pass or fail.

src/content/docs/cloudflare-one/integrations/service-providers/kolide.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ import { Render } from "~/components";
4444
/>
4545

4646
5. Enter the **Client secret** you noted down above.
47-
6. Choose a **Polling frequency** for how often Cloudflare Zero Trust should query Kolide for information.
47+
6. Choose a **Polling frequency** for how often Cloudflare One should query Kolide for information.
4848
7. Select **Test and save**.
4949

5050
### 3. Configure the posture check

src/content/docs/cloudflare-one/integrations/service-providers/microsoft.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ To retrieve those values:
6060
/>
6161

6262
5. Enter the **Client ID**, **Client secret** and **Customer ID** as you noted down above.
63-
6. Select a **Polling frequency** for how often Cloudflare Zero Trust should query Microsoft Graph API for information.
63+
6. Select a **Polling frequency** for how often Cloudflare One should query Microsoft Graph API for information.
6464
7. Select **Test and save**.
6565

6666
## 3. Configure the posture check

src/content/docs/cloudflare-one/integrations/service-providers/sentinelone.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ To retrieve those values:
5454
<Render file="posture/add-service-provider" params={{ provider: "SentinelOne" }} product="cloudflare-one"/>
5555
5. In **Client Secret**, enter your **API Token**.
5656
6. In **Rest API URL**, enter `https://<S1-DOMAIN>.sentinelone.net`.
57-
7. Choose a **Polling frequency** for how often Cloudflare Zero Trust should query SentinelOne for information.
57+
7. Choose a **Polling frequency** for how often Cloudflare One should query SentinelOne for information.
5858
8. Select **Test and save**.
5959

6060
### 3. Configure the posture check

src/content/docs/cloudflare-one/integrations/service-providers/taniums2s.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ To retrieve the API URL, determine your Tanium Gateway root endpoint:
6262
/>
6363

6464
5. Enter the **Client Secret** and **REST API URL** you noted down above.
65-
6. Choose a **Polling frequency** for how often Cloudflare Zero Trust should query Tanium for information.
65+
6. Choose a **Polling frequency** for how often Cloudflare One should query Tanium for information.
6666
7. Select **Test and save**.
6767

6868
### 3. Configure the posture check

src/content/docs/cloudflare-one/integrations/service-providers/uptycs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ To obtain these values:
4848
/>
4949

5050
5. Enter the **Client ID**, **Client secret** and **Customer ID** as you noted down above.
51-
6. Select a **Polling frequency** for how often Cloudflare Zero Trust should query Uptycs for information.
51+
6. Select a **Polling frequency** for how often Cloudflare One should query Uptycs for information.
5252
7. Select **Test and save**.
5353

5454
## 3. Configure the posture check

src/content/docs/cloudflare-one/integrations/service-providers/workspace-one.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ To retrieve those values:
5757
/>
5858

5959
5. Enter the **Client ID** and **Client secret** you noted down above.
60-
6. Select a **Polling frequency** for how often Cloudflare Zero Trust should query Workspace ONE for information.
60+
6. Select a **Polling frequency** for how often Cloudflare One should query Workspace ONE for information.
6161
7. Enter the **Region-specific token URL** and **REST API URL** you noted down above.
6262
8. Select **Test and save**.
6363

src/content/docs/cloudflare-one/reusable-components/posture-checks/access-integrations/mutual-tls-authentication.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The mTLS certificate is used only to verify the client certificate. It does not
4545

4646
6. Save the policy.
4747

48-
7. Go to **Access** > **Policies**.
48+
7. Go to **Access controls** > **Policies**.
4949

5050
8. [Create an Access policy](/cloudflare-one/access-controls/policies/policy-management/#create-a-policy) using one of the following [selectors](/cloudflare-one/access-controls/policies/#selectors):
5151
- **Valid Certificate**: Any client certificate that can authenticate with the Root CA will be allowed to proceed.
@@ -63,7 +63,7 @@ The mTLS certificate is used only to verify the client certificate. It does not
6363

6464
</Example>
6565

66-
10. Save the policy, then go to **Access** > **Applications**.
66+
10. Save the policy, then go to **Access controls** > **Applications**.
6767

6868
11. Select the application you would like to enforce mTLS on and select **Configure**. The application must be included in the **Associated hostnames** list from Step 5.
6969

src/content/docs/cloudflare-one/reusable-components/posture-checks/access-integrations/tanium.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@ The integration does not currently support Safari.
4444

4545
1. Configure your Tanium deployment using the [step-by-step documentation](https://docs.tanium.com/endpoint_identity/endpoint_identity/userguide.html) provided. You will need the public key to integrate your Tanium deployment with Cloudflare Access.
4646

47-
2. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **WARP Client**.
47+
2. In [Cloudflare One](https://one.dash.cloudflare.com), go to **Reusable components** > **Posture checks**.
4848

49-
3. Scroll down to **WARP client checks** and select **Add new**.
49+
3. Go to **WARP client checks** and select **Add a check**.
5050

5151
4. Select **Tanium** from the list of providers.
5252

src/content/docs/cloudflare-one/reusable-components/posture-checks/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Setup instructions and requirements vary depending on the device posture attribu
2121

2222
Before integrating a device posture check in a Gateway or Access policy, verify that the Pass/Fail results match your expectations. To view the latest test results for a specific device:
2323

24-
1. In [Zero Trust](https://one.dash.cloudflare.com/), go to **My Team** > **Devices**.
24+
1. In [Cloudflare One](https://one.dash.cloudflare.com/), go to **Team & Resources** > **Devices**.
2525
2. Select the device.
2626
3. Select **View details**.
2727
4. Select the **Posture checks** tab.

0 commit comments

Comments
 (0)